HB-MP: a further step in the HB-family of lightweight authentication protocols
From MaRDI portal
Publication:883245
DOI10.1016/j.comnet.2007.01.011zbMath1118.68015OpenAlexW2076545682MaRDI QIDQ883245
Publication date: 4 June 2007
Published in: Computer Networks (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.comnet.2007.01.011
Network design and communication in computer systems (68M10) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (10)
Efficient authentication from hard learning problems ⋮ How to Encrypt with the LPN Problem ⋮ SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags ⋮ On the Security of HB# against a Man-in-the-Middle Attack ⋮ Good Variants of HB + Are Hard to Find ⋮ Two-Round Man-in-the-Middle Security from LPN ⋮ Parallel and concurrent security of the HB and \(HB^{+}\) protocols ⋮ A protocol for provably secure authentication of a tiny entity to a high performance computing one ⋮ : Increasing the Security and Efficiency of ⋮ HB-MP
This page was built for publication: HB-MP: a further step in the HB-family of lightweight authentication protocols